ZxShell

Malware updated 6 months ago (2024-06-03T17:17:32.202Z)
Download STIX
Preview STIX
ZXShell is a malicious software (malware) that has been used by various cyber threat actors to exploit and damage computer systems. It is known to be associated with other malware such as PANDORA, SOGU, GHOST, WIDEBERTH, QUICKPULSE, FLOWERPOT, QIAC, Gh0st, Poison Ivy, BEACON, HOMEUNIX, STEW, among others. The malware can infect systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. Advanced Persistent Threat (APT) groups like APT27 and APT20 have used ZXShell, employing spear phishing and strategic web compromises as initial attack vectors. The ZXShell backdoor was previously used by the HiddenLynx/APT17 group. However, since the source code of ZXShell is now publicly available, this does not definitively link these two groups. The malware is also linked to a variety of other malicious tools including China Chopper web shell, Gh0st RAT, HyperBro, PlugX, SysUpdate, and more. These tools are used to exfiltrate high-value information and maintain persistent access to sensitive systems over long periods of time. The threat actors in recent campaigns have been observed using an updated version of the ZXShell rootkit, indicating continuous development and enhancement of the malware. ZXShell employs a unique method for communication by hooking the NtWriteFile API and recognizing five different special handle values as commands. It primarily functions as a Remote Administration Tool (RAT), allowing the threat actor to have continuous backdoor access to the compromised machine. Some observed rootkit samples include an embedded variant of the ZXShell backdoor. This, combined with its ability to disable antivirus software, makes ZXShell a formidable threat. Its ongoing use and development underscore the need for robust cybersecurity measures and constant vigilance.
Description last updated: 2024-06-03T16:18:30.955Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Rootkit
Apt
Loader
Symantec
Malware
Antivirus
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Lancefly Threat Actor is associated with ZxShell. Lancefly, a threat actor potentially associated with China, has been identified as the group behind an ongoing cyberespionage campaign targeting organizations in South and Southeast Asia. The targets include government bodies, aviation companies, educational institutions, and telecommunication sectoUnspecified
5
The APT41 Threat Actor is associated with ZxShell. APT41, also known as Winnti, is a threat actor suspected to be originating from China, with its activities dating back to as early as 2012. It has targeted organizations in at least 14 countries and has been associated with the use of at least 46 different code families and tools. The group's activiUnspecified
5
The APT17 Threat Actor is associated with ZxShell. APT17, also known as Tailgator Team and Deputy Dog, is a threat actor suspected to be affiliated with the Chinese intelligence apparatus. This group has been associated with various aliases including Winnti, PassCV, Axiom, LEAD, BARIUM, Wicked Panda, and GREF. The primary targets of APT17 are the U.has used
2
Source Document References
Information about the ZxShell Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Checkpoint
6 months ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
MITRE
2 years ago
MITRE
2 years ago
MITRE
2 years ago
Flashpoint
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
Securityaffairs
2 years ago
CSO Online
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
BankInfoSecurity
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago
CERT-EU
2 years ago